When the form is posted, the value of this field is compared to the value of the authentication key in session, to verify that the form submission was valid.
当表单被提交时,系统将把此字段的值与会话中的认证密钥值相比较,以检验表单提交是否有效。
A good example of this would be a user using the application, taking a lunch break, and returning to the application after the authentication key had expired.
这方面的一个很好的例子是用户正在运行应用程序,午饭过后,当他返回到应用程序时,认证密钥已经过期了。
Aiming at the demand of contactless smart card, this paper proposes a new mutual authentication key exchange protocol based on low power computing devices.
针对非接触式智能卡的需求,提出一种基于有限计算能力的相互认证密钥交换协议。
To establish an Account, you will be required to provide Blizzard with certain personal information and the Authentication Key provided to you by Blizzard.
为了建立一个帐户,你将会要由大风雪对你用特定的个人数据和证明钥匙提供大风雪提供。
Defense in depth can also be used to solve the problem of protecting cryptographic authentication information (usually called a key) from people who break into your machine.
深度防御也可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵您的机器的问题。
Double key secure authentication is one of the protection methods used to verify access across different systems.
双重密钥安全认证是用于验证跨不同系统访问的保护方法之一。
This specifies the use of the RSA Key Exchange and authentication algorithm, along with the RC4_SHA_US CipherSpec.
它规定了RSA密钥交换和认证算法的使用,还规定了RC4_SHA_US密码规范。
The ability to do end-to-end authentication and authorization is key to doing real distributed, multi-org composite apps.
有能力完成端到端的认证和授权是进行真正的分布式、跨组织组合应用的关键所在。
The SSH daemon does not allow key-based authentication if the home directory if people other than the user can write to it.
如果除应用程序用户以外还有人能够修改home目录,那么SSH守护进程就不支持基于密钥的认证。
The OpenSSH client user ram is all set for Public Key authentication to user laxman on the OpenSSH server with EFS login. Verify the same with ssh login from client
现在准备使用EFS登录由OpenSSH服务器上的用户laxman 对 OpenSSH客户机用户ram 进行公钥认证。
The key exchange and authentication algorithm used during the SSL handshake.
SSL握手过程中的密钥交换和认证算法。
These runtime environments should be configured to use global security, and they should be configured to use LTPA authentication with the same LTPA key.
这些运行时环境应该配置为使用全局安全性,而且应该配置为通过相同LTPA密钥进行LTPA身份验证。
This key is generated by the authentication service and is Shared between the client and the authentication service for all future communications.
这个密钥由身份验证服务生成,由客户端和身份验证服务共同用于所有未来通信。
This password check is done even if the user is following the public key or host-based authentication.
即使用户采用公共密钥或基于主机的身份验证,也会执行这个密码检查。
Thus, establishing robust identity management processes to achieve authentication and authorization is one of the key aspects to successfully compile a secure software solution.
因此,必须建立健壮的身份管理过程来实现身份验证和授权,这是成功实现安全的软件解决方案的关键因素之一。
When configured with public key authentication, your key proves your identity to remote SSH hosts.
当配置为公钥身份验证时,您的密钥证明您在远程ssh主机上的身份。
The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.
可信主机身份验证和公私ssh密钥对身份验证方法是类似的,在很大程度上实现相同的结果。
Private-public key pair authentication requires both client and server configuration.
公私密钥对身份验证同时需要客户端和服务器配置。
A ticket is provided by an authentication server to the client using a cryptographic key of the intended server.
身份验证服务器使用目标服务器的一个密码密钥将票据提供给客户端。
Unless your API is a free, read-only public API, don't use single key-based authentication.
除非你的API是一个免费的,只读的公开api,否则不要使用单一的基于密钥的验证。
SPKM provides authentication, key establishment, data integrity, and data confidentiality in an online distributed application environment using a public key infrastructure.
SPKM使用公钥基础设施在一个联机分布式应用程序环境下提供身份验证、密钥设立、数据完整性和数据机密性。
It then describes how you can achieve authentication based on public key technology, using the new GSS-API security mechanisms with the customizable DB2 UDB security plug-ins.
然后还将描述:如何通过使用新的具有可定制的DB 2UDB安全插件的GSS - API安全机制来实现基于公钥技术的身份验证。
KDC is responsible for key distribution and all the authentication processes which may take place in the network.
KDC负责密钥分发和可能在网络上发生的所有身份验证过程。
After the authentication, SSL will actually use secret key encryption to secure the channel, but the details of that aren't relevant to this discussion.
在身份验证之后,SSL将真正使用保密的密钥加密来保护通道,但其细节与本讨论无关。
This message's integrity is protected via an encrypted checksum using the session key between the client and authentication service.
此消息的完整性通过一个校验和来保护,该校验和使用客户端与身份验证服务器之间的会话密钥进行加密。
OpenSSH supports two types of encryption, namely host-based authentication and public-key authentication.
OpenSSH支持两种类型的加密,即基于主机的认证和公钥认证。
Both host-based and public key-based authentication using SSH are more secure than RSH rhost-based authentication.
使用ssh的基于主机的认证和基于公钥的认证都比基于rshrhost的认证安全。
At this point, ssh public key-based authentication is now complete, and you can proceed to " DB2 configuration."
至此,ssh 基于公钥的认证已经完成,现在可以进入“DB2配置”。
No SSH server configuration is necessary, since, by default, SSH will attempt to use public key-based authentication before password based authentication.
这里不需要ssh服务器配置,因为在默认情况下,在基于密码的认证之前,ssh将尝试使用基于公钥的认证。
This directory must be mode 700, or SSH won't use public or private key authentication.
这个目录的模式必须为700,否则ssh无法使用公钥或私钥身份验证。
应用推荐